[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-296 ---- graphviz

ID: oval:org.secpod.oval:def:1600000Date: (C)2016-01-05   (M)2022-10-10
Class: PATCHFamily: unix




Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list." Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file. Graphviz was recently reported to be affected by a buffer overflow vulnerability, which seem to have introduced in the fix for CVE-2014-0978 .

Platform:
Amazon Linux AMI
Product:
graphviz
Reference:
ALAS-2014-296
CVE-2014-1235
CVE-2014-1236
CVE-2014-0978
CVE    3
CVE-2014-0978
CVE-2014-1236
CVE-2014-1235
CPE    3
cpe:/o:amazon:linux
cpe:/a:graphviz:graphviz:2.34.0
cpe:/a:graphviz:graphviz

© SecPod Technologies